Cicada

Recon

nmap_scan.log|h-50%_styled

SMB

Guest

Creds: guest:<BLANK>

Password Spray

Creds: michael.wrightson:Cicada$M6Corpb*@Lp#nZp!8

LDAP Enumeration (michael.wrightson)

Active Directory Enumeration with Mastertularrow-up-right

Cicada-Mastertularrow-up-right

Writeup.png

Creds: david.orelious:aRt$Lp#7t*VQ!3

david.orelious

emily.oscars

Creds: emily.oscars:Q!3@Lp#M6b*7t*Vt

User.txt

Privilege Escalation

Nothing much valuable, except that we are part of Backup Operators group.

Writeup-1.png

She's the only user that has home directory.

Nothing interesting...

SeBackupPrivilege

Check whoami

SeBackupPrivilege looks interesting.https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/privilege-escalation-abusing-tokensarrow-up-righthttps://book.hacktricks.xyz/windows-hardening/active-directory-methodology/privileged-groups-and-token-privileges#local-attackarrow-up-right

Acl-FullControl fails to give access and it's most probably because the Access is denied.

https://github.com/giuliano108/SeBackupPrivilege/tree/masterarrow-up-right

Root.txt

Hashdump

Creds: Administrator:2b87e7c93a3e8a0ea4a581937016f341


Writeup-2.png

https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/robocopyarrow-up-right

Good resource: https://kb.offsec.nl/tools/techniques/backupoperatortoda/arrow-up-right

From Dark_Man again:

Similar project: https://github.com/improsec/BackupOperatorToolkitarrow-up-right

Note: The administrator account in SAM is a local account and its hash is different from domain admin hash. To be able to use this local account, use must enable DSRM mode by modifying the registry key. in this machine, the two are the same, but it's not always as this.

Last updated